A ROBUST REAL-TIME SECURE COMMUNICATION APPROACH OVER PUBLIC SWITCHED TELEPHONE NETWORK

Size: px
Start display at page:

Download "A ROBUST REAL-TIME SECURE COMMUNICATION APPROACH OVER PUBLIC SWITCHED TELEPHONE NETWORK"

Transcription

1 Journal of Naval Science and Engineering 2011, Vol.7, No.1, pp A ROBUST REAL-TIME SECURE COMMUNICATION APPROACH OVER PUBLIC SWITCHED TELEPHONE NETWORK Ahmet KARACA Technical Education Faculty, Computer Systems Education, Esentepe Campus, Serdivan, Sakarya, 54187,Turkey [email protected] Özdemir ÇETIN Asst.Prof. Technical Education Faculty, Computer Systems Education, Esentepe Campus, Serdivan, Sakarya, 54187,Turkey [email protected] Abstract In this paper, a secure phone system implemented over Public Switched Telephone Network (PSTN). Speech data is sent through a dial-up modem over PSTN to receiver after converted digital form and ciphered. In this study, Scalable Encryption Algorithm (SEA) is used. SEA is developed for systems have low level memory and low power process. Also in this system, a text file can be embedded into speech data before encrypted voice data. By this means, security of system is increased. During a text file is embedding into speech data, distortion in speech data is kept low level according to Human Auditory System (HAS). Even if eavesdroppers can get decrypted speech data they must detect hidden data in speech data. And then malicious people have to use steganalysis techniques to get secret data. 37

2 A Robust Real-Time Secure Communication Approach Over Public Switched Telephone Network AÇIK ANAHTARLAMALI TELEFON HATTI ÜZERİNDEN GERÇEK ZAMANLI DAYANIKLI BİR GÜVENLİ HABERLEŞME YAKLAŞIMI Özetçe Bu çalışmada Public Switched Telephone Network (PSTN) üzerinden güvenli haberleşme amaçlı bir sistem gerçekleştirilmiştir. Konuşma sinyali dijital sinyale çevrilip şifrelendikten sonra bir dial up modem aracılığıyla PSTN üzerinden alıcıya gönderilmektedir. Burada şifreleme için düşük bellek ve işlem gücüne sahip sistemler için geliştirilmiş SEA kullanılmıştır. Gerçekleştirilen sistem ile aynı zamanda konuşma sinyali şifrelenmeden önce bu sinyalin üzerine bir metin dosyası gizlenebilmektedir ve bu sayede sistemin güvenliği arttırılmıştır. Metin dosyası ses sinyali üzerine gömülürken ses sinyalindeki bozulmalar kulakla algılanmayacak seviyede tutulmaktadır. Hattı dinleyen yetkisiz kişiler şifrelemeyi çözüp ses sinyalini elde etseler bile ses içinde gizlenmiş bir veri olduğunu algılayıp steganaliz yöntemleri ile bunu çözmeleri gerekmektedir. Keywords: PSTN, SEA, secure communication, steganography, steganalysis Anahtar Kelimeler: PSTN, SEA, güvenli Haberleşme, stenografi, steganaliz 1. INTRODUCTION In the present day, information technologies are developing rapidly. The result of this, secure communication between individuals and corporations becomes an important issue among researchers. So far many secure communication techniques have been developed about audio, video or text data cipher [1-5]. The important aim for these techniques is to protect privacy of communication. Nowadays, people commonly use voice communication resources are becoming a big part of life in their very important works such as Internet 38

3 Ahmet KARACA, Özdemir ÇETİN banking. Because of this, ensuring reliability of communication media is becoming important issue. Wireless secure communication techniques are different than wire secure communication techniques. Wireless techniques are more open to attack than wire techniques [8-11]. Because security of wireless communication is more vulnerable than wire to use wire communication when high security level is necessary is more convenient. In the proposed study, a secure communication implementation is aimed over wire phone lines. However choosing wire phone lines for secure communication bring some restriction. For instance, bandwidth is between 300 Hz and 3500 Hz for voice communication in switchboard [9,10]. Therefore, voice data is sent after compression over the phone line. Compression process causes decrease sample number and also reduces voice quality. Hereby, secret communication possibility is reduced. In this study, voice data is sent over phone line after ciphered and also an important data is embedded to voice data by steganography technique can be sent at the same time. By this way, security of communication can be high level. So it is almost impossible to Access secret data. Paper organization is: related works are given in the second part. In the third part, developed security system and its implementation are described. In the last part, results of the study are given. 2. BASIC OF SECURE PHONE SYSTEMS At the present time, there are a few techniques using for speech communication as Public Switch Telephone Network (PSTN), Integrated Services Digital Network (ISDN) and Asymmetric Digital Subscriber Line (ADSL). Communication lines using ISDN and ADSL techniques also can perform data communications by speech communication. PSTN, which creates the basis of used telephone lines today, is a communication technique that has been improved to use for speech communication. Since the purpose of this technique is only speech communication, voice quality is 39

4 A Robust Real-Time Secure Communication Approach Over Public Switched Telephone Network not very important. Although Human Earing System (HES) is sensitive for voices between 20 and Hz, bandwidth of PSTN between Hz is enough for a comprehensible communication. In secure phone applications, dial-up modems which are working on this channel and were used for internet connection in the past have been used for data transfer. Here, after analogue speech information had been converted to digital information, it has been encrypted and sent by modem. DAC ADC Speech Coder Encryption/ Decryption Modem PSTN DAC ADC Speech Coder Encryption/ Decryption Modem Figue 1. General block diagram of secure communication system Block diagram representing secure communication generally is shown in Figure 1. For speech signals can be encrypted, they need to be digital. The ADC unit in the block diagram is used for converting analogue signal coming from microphone to digital for the encryption can be done. In speech encoder unit compression process is performed for the speech signal converted to digital information can be encrypted more quickly. Since the bandwidth of communication line is limited, this process has been also provided advantages sending data. After compressed speech data are encrypted with selected encryption algorithm, they have been sent over phone line by a dial-up modem working full duplex. In the receiver unit reverse of these processes are performed. 40

5 Ahmet KARACA, Özdemir ÇETİN In subsections speech coder, encryption and modem units which create secure phone system will be explained briefly. 2.1 Speech Coder Block Selection of cabled telephone lines for secure communication has been brought along some limitations also. Because the number of data can be sent over telephone line by modem in a certain time is limited, the compression of speech signal with speech coder is purposed. The works in literate Code-Excited Linear Prediction (CELP) coder had been mostly used as speech coder. Since decreasing number of used samples with speech coding saves extra time for encryption algorithm, this allows the use of more powerful encryption algorithm. CELP coder had been used as speech coder in the work performed by L. Diez-del-Rio and the others [3]. These researchers had performed 9600 bps and 4800 bps coding according to voice quality. In the other work J. Calpe and the others had used two different CELP speech coders as 9600 bps and 7200 bps [2]. Anas and the others had used a 4800bps rate speech coder which was termed ICELP by them in their work [1]. 2.2 Encryption block Encryption block is the most important part of the system. Durability of the used encryption algorithm is the most significant fact which determines the system reliability. In the work performed by L. Diez-del-Rio and the others, an asymmetric encryption based technique named Tiche had been used to encrypt communication information [3]. In microcontroller systems with low memory capacity and process power, It cannot be expected that asymmetric encryption, which needs high process power, works with full performance. A type of RSA algorithm had been used in the work of J. Calpe and teh others [2]. Anas and the others had been used DES algorithm as encryption algorithm [1]. DES is appropriate for low power process microcontroller systems; its security of encryption is not enough, though. 41

6 A Robust Real-Time Secure Communication Approach Over Public Switched Telephone Network 2.3 Modem In applications of secure phone, modem is used for transfer of encrypted speech data on cabled communication line over PSTN. Running on rate of 9600 bps and full duplex modem with CCITT V32 standard had been used in works performed by Luiz Diez-del-Rio, Javier Calpe, Anas. 3. DESCRIPTION OF THE PROPOSED SYSTEM Hidden Data DA AD Speec h Coder Encryption /Decryptio n Mode m C8051F120 PSTN Hidden Data DA AD Speec h Coder Encryption /Decryptio n Mode m C8051F120 Figure 2. Block diagram of the designed secure communication system 42

7 Ahmet KARACA, Özdemir ÇETİN The block diagram of the proposed system presented in the paper is as shown in Figure 2. Designed system includes hidden data embedding (stenography) unit which is different from present secure phone systems. Therefore, even though encrypted voice communication might be subjected to an attack, it would not be discerned as it is send by stenographical method. Although attackers might capture the voice communication they wouldn t reach the actual hidden information. Another contribution of the designed system is that it uses recently developed an encryption algorithm called Scalable Encryption Algorithm (SEA). Figure 3. C8051F120DK development board For the implementation of the designed system, C8051F120DK development board produced by SILABS is utilized. The microcontroller on the board has 100 Mips of computing power. Microcontroller includes the units of ADC and DAC having 12 bit resolution. Apart from modem, all other blocks are implemented on this development board. Speech coder, data embedding and encryption algorithms were written using C language for C8051F120 microcontroller. 3.1 Encryption block SEA is an encryption algorithm developed in 2006 by François- Xavier Standaert and etc. for embedded systems having restricted resources 43

8 A Robust Real-Time Secure Communication Approach Over Public Switched Telephone Network such as memory size and computing power [6-8]. SEA s design criteria s depending on symmetric block encryption approximation are small memory utilization, small code size and limited instruction set. For these reasons, only bit operations like Exclusive OR, bit/word rotations, mod 2b sum and s-box are used. Having quite flexible structure, SEA is expressed by SEA(n,b) and it can work on different text, key/word lengths. In addition, SEA relaying on Fiestel structure with variable rotation count is described by the following parameters: n: raw text and key size b: word n b = n/2b: the number of words per Feistel branch n r : the number of encryption tour In the realization of SEA algorithm, the parameters of n and b are selected according to target processor s features. On the other hand key and raw text size should be multiples of 6, like; 48, 96,, 192 bit. Another important points for providing a effectual safety level are that word length should be b 8 and rotation count should be at least n r = 3n/4+2(n b +[ b/2]) [6-8]. In addition to being up to date and having powerful structure against attacks, one of the most important reasons why SEA algorithm was utilized in this study is that it is designed for embedded systems having limited resources such as memory size and computing power. SEA which has a considerable flexible structure can be used easily with microcontrollers working with simple logical and arithmetic instructions. In addition, previous studies show that SEA encryption algorithm wasn t utilized in the secure voice communication applications before. Figure 4 shows the structure of SEA algorithm. 44

9 Ahmet KARACA, Özdemir ÇETİN Şifrelenmemiş (Ham) Metin (48, 96, 192 bit) Şifreleme Anahtarı (48, 96, 192 bit) Kullanılan anahtar (48, 96, 192 bit) büyüklüğüne göre tur sayısı 25, 46, Tur 2. Tur Son Tur Anahtar Cetveli Şifrelenmiş Metin (48, 96, 192 bit) Figure 4. Scalable encryption algorithm (SEA)[8]. 3.2 Hidden Data embedding block The function of data embedding block is to send a secret data embedded in the voice signal to the target. In order to realize this function, hidden data coming from computer is added to voice signal by changing the bits that do not disturb the voice data obtained from the output of speech coder. Because the main goal of stenography is to prevent attackers from perceiving the hidden information, embedded voice signal wouldn t be discerned by unauthorized persons. Therefore an additional safety level which wasn t used in the previous studies is added to system. In order for attackers to reach the hidden data, it is necessary for them to apply steganalysis methods to signal obtained by decoding encrypted voice information. 45

10 A Robust Real-Time Secure Communication Approach Over Public Switched Telephone Network Speech coder çıkışındaki dijital ses sinyali Metin dosyasındaki karakterlerin binary forma dönüştürülmesi Veri gömme için uygun bit alanlarının belirlenmesi Veri gömme işlemi Geri elde etme işleminde gerekli parametrelerin belirlenmesi Figure 5. Flow diagram of data embedding algorithm 4. CONCLUSION Sırlı ses sinyalinin elde In this paper, we implemented secure communication over wired phone link. The proposed system provides two advantages compared to other systems in literature. Firstly, it use a new encryption algorithm namely Scalable Encryption Algorithm. Secondly, the implemented system presents hidden file transferring with voice stenography technique. DES and RSA encryption algorithms used in existing works have a several disadvantages. Although DES algorithm is fast algorithm, it has lost reliability nowadays. However, RSA algorithm that is asymmetric encryption algorithm is not suitable for systems based on microcontroller due to requirement high processing load. SEA is designed for microcontroller systems. Also, it presents high fast and security. In addition to voice encryption for secure communication, we presented hidden file transfer application in this work. Hidden file transferring is realized embedding file within voice data using stenography methods. Attackers will spend to solve encrypted 46

11 Ahmet KARACA, Özdemir ÇETİN communication during attacking time. Even if the encryption communication is solved, this solution will not be sufficient to obtain hidden file. Consequently, employing of the implemented system will be provided high security in wired communication links. REFERENCES [1] Anas N.M.,Rahman Z., Shafii A.,Rahman M.N.A.,Amin Z.A.M., Secure Speech Communication over Public Switched Telephone Network, Asia-Pacific Conference on Applied Electromagnetics Procedings, pp , MALAYSIA, [2] Calpe, J.; Magdalena, J.R.; Guerrero, J.F.;Frances, J.V., "Toll-quality digital secraphone" Electrotechnical Conference, MELECON '96, 8th Mediterranean pp Volume 3, [3] Diez-Del-Rio, L.; Moreno-Perez, S.; Sarmiento, R.; Parera, J.; Veiga-Perez, M.; Garcia- Gomez, R., "Secure speech and data communication over the public switching telephone network", Acoustics, Speech, and Signal Processing, ICASSP-94., 1994 IEEE International Conference on Volume II, pp , [4] Uma Devi.G, Steganography-Survey on File Systems, Research CSE I I I T Hyderabad, [5] Christian Cachin, Digital Steganography, IBM Research Zurich Research Laboratory, Rüschlikon, Switzerland, [6] Standaert, F. -X., Piret, G., Gershenfeld, N., Quisquater, J.-J., "SEA: A Scalable Encryption Algorithm for Small Embedded Applications", Lecture Notes in Computer Science, Vol. 3928, April 2006, pp [7] Macé, F., Standaert, F.-X., Quisquater, J.-J., "FPGA Implementation(s) of a Scalable Encryption Algorithm", IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 16, No.2, Nov. 2007, pp [8] Çakıroğlu M., Bayılmış C., SEA Şifreleme Algoritması Kullanarak Güvenli Kablosuz Algılayıcı Ağ Haberleşmesinin Gerçekleştirilmesi, 3. Uluslararası Katılımlı Bilgi Güvenliği ve Kriptoloji Konferansı", , Aralık [9] Chowdhury D.D., Unified IP Internet-Working, ISBN , Springer- Verlag, Germany, [10] Valin M.J., Lefebure R., Bandwidth Extension Of Narrowband Speech For Low Bit- Rate Wıdeband Coding, pp , Speech Coding Conf., [11] Ahmadian Z., Salimi S., Salahi A., Security enhancements against UMTS GSM interworking attacks pp Computer Networks 54 (2010). 47

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies [email protected] Dr. Mohammad Alaa Al-

More information

Radio over Internet Protocol (RoIP)

Radio over Internet Protocol (RoIP) Radio over Internet Protocol (RoIP) Presenter : Farhad Fathi May 2012 What is VoIP? [1] Voice over Internet Protocol is a method for taking analog audio signals, like the kind you hear when you talk on

More information

Performance of Various Codecs Related to Jitter Buffer Variation in VoIP Using SIP

Performance of Various Codecs Related to Jitter Buffer Variation in VoIP Using SIP Performance of Various Related to Jitter Buffer Variation in VoIP Using SIP Iwan Handoyo Putro Electrical Engineering Department, Faculty of Industrial Technology Petra Christian University Siwalankerto

More information

Introduction and Comparison of Common Videoconferencing Audio Protocols I. Digital Audio Principles

Introduction and Comparison of Common Videoconferencing Audio Protocols I. Digital Audio Principles Introduction and Comparison of Common Videoconferencing Audio Protocols I. Digital Audio Principles Sound is an energy wave with frequency and amplitude. Frequency maps the axis of time, and amplitude

More information

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah

More information

Video Conferencing Standards

Video Conferencing Standards Video Conferencing Standards TANDBERG Application Notes D10740, Rev 2.3 This document is not to be reproduced in whole or in part without the permission in writing from TANDBERG ITU DEFINED STANDARDS...3

More information

A Study of New Trends in Blowfish Algorithm

A Study of New Trends in Blowfish Algorithm A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department

More information

Simple Encryption/Decryption Application

Simple Encryption/Decryption Application Simple Encryption/Decryption Application Majdi Al-qdah Faculty of Information Technology Multimedia University Cyberjaya, 63100, Malaysia [email protected] Lin Yi Hui Faculty of Information Technology

More information

Voice Encryption over GSM:

Voice Encryption over GSM: End-to to-end Voice Encryption over GSM: A Different Approach Wesley Tanner Nick Lane-Smith www. Keith Lareau About Us: Wesley Tanner - Systems Engineer for a Software-Defined Radio (SDRF) company - B.S.

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

Telecommunications systems (Part 1)

Telecommunications systems (Part 1) School of Business Eastern Illinois University Telecommunications systems (Part 1) (Week 11, Thursday 11/02/2006) Abdou Illia, Fall 2006 Learning Objectives 2 Describe and compare types of connection to

More information

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Real-Time DMB Video Encryption in Recording on PMP

Real-Time DMB Video Encryption in Recording on PMP Real-Time DMB Video Encryption in Recording on PMP Seong-Yeon Lee and Jong-Nam Kim Dept. of Electronic Computer Telecommunication Engineering, PuKyong Nat'l Univ. [email protected], [email protected]

More information

Simple Voice over IP (VoIP) Implementation

Simple Voice over IP (VoIP) Implementation Simple Voice over IP (VoIP) Implementation ECE Department, University of Florida Abstract Voice over IP (VoIP) technology has many advantages over the traditional Public Switched Telephone Networks. In

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide

More information

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include

More information

1. INTRODUCTION. Keywords SMS, GSM network, electrical device, encryption, control.

1. INTRODUCTION. Keywords SMS, GSM network, electrical device, encryption, control. Secure Control of Remote Electrical Devices Using Mobile SMS Services Kishor T. Mane 1, G.A. Patil 2 1. Asst. Professor, 2. Head and Asst. Professor D. Y. Patil college of Engg. & Tech. Kolhapur, Maharashtra,

More information

Keywords Web Service, security, DES, cryptography.

Keywords Web Service, security, DES, cryptography. Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Provide the

More information

WAN Technology. Heng Sovannarith [email protected]

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith [email protected] Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

NXU RoIP Link to Eliminate Voice-Grade Leased Line

NXU RoIP Link to Eliminate Voice-Grade Leased Line NXU RoIP Link to Eliminate Voice-Grade Leased Line Purpose This Application Note will describe a method at which Network Extension Units (NXUs) can be utilized on an existing digital network to eliminate

More information

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,

More information

A TOOL FOR TEACHING LINEAR PREDICTIVE CODING

A TOOL FOR TEACHING LINEAR PREDICTIVE CODING A TOOL FOR TEACHING LINEAR PREDICTIVE CODING Branislav Gerazov 1, Venceslav Kafedziski 2, Goce Shutinoski 1 1) Department of Electronics, 2) Department of Telecommunications Faculty of Electrical Engineering

More information

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network. Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote

More information

Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

More information

A Reliable System Integration Study Using Open Source VoIP Software

A Reliable System Integration Study Using Open Source VoIP Software A Reliable System Integration Study Using Open Source VoIP Software * 1 Ahmet Özmen and 2 Veysel Harun Şahin * 1 Faculty of Computer and Information Sciences, Department of Computer Engineering, Sakarya

More information

Software Obfuscation Scheme based on XOR Encoding Scheme

Software Obfuscation Scheme based on XOR Encoding Scheme Software Obfuscation Scheme based on XOR Encoding Scheme KDDI R&D Laboratories, Inc. 27 th Mar. 2008 2008 2008 KDDI R&D Laboratories, Inc. Inc. All All right right reserved 1 My Research Area Software

More information

Triple Security of Information Using Stegnography and Cryptography

Triple Security of Information Using Stegnography and Cryptography Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

What is telecommunication? electronic communications? What is telephony?

What is telecommunication? electronic communications? What is telephony? What is telecommunication? Telecommunication: Any transmission, emission or reception of signs, signals, writing, images and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic

More information

A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

More information

Data Transmission. from one person or place to another. person or place to another of passing something

Data Transmission. from one person or place to another. person or place to another of passing something Data Transmission Transmission: the process of passing something from one person or place to another of passing something from one person or place to another Data Transmission Main types of Transmission

More information

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how

More information

SECURE COMMUNICATIONS Crypto products

SECURE COMMUNICATIONS Crypto products FIG 1 The TopSec Mobile is an easy-to-use encryption device that is independent of the mobile phone. It can be connected to virtually any modern mobile phone via its Bluetooth interface. The mobile phone

More information

Safer data transmission using Steganography

Safer data transmission using Steganography Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],

More information

VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.)

VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.) VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.) 1 Remember first the big picture VoIP network architecture and some terminologies Voice coders 2 Audio and voice quality measuring

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey

Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey Dr. YILDIRAY YALMAN Associate Professor CONTACT INFORMATION Turgut Ozal University Computer Engineering Department TR-06010 Ankara, Turkey Phone: +90 (0)312-5515437 E-mail: [email protected] RESEARCH

More information

What is telecommunication? electronic communications. service?

What is telecommunication? electronic communications. service? What is telecommunication? Telecommunication: Any transmission, emission or reception of signs, signals, writing, images and sounds or intelligence of any nature by wire, radio, optical or other electromagnetic

More information

Split Based Encryption in Secure File Transfer

Split Based Encryption in Secure File Transfer Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Voice-over-Internet Protocols: a new dimension for translation interaction

Voice-over-Internet Protocols: a new dimension for translation interaction Voice-over-Internet Protocols: a new dimension for translation interaction ANDRÉS SALTER IGLESIAS Voice-over-Internet Protocols: a new dimension for translation interaction Abstract. Voice-over-Internet

More information

How To Understand The Technical Specifications Of Videoconferencing

How To Understand The Technical Specifications Of Videoconferencing Videoconferencing Glossary Algorithm A set of specifications that define methods and procedures for transmitting audio, video, and data. Analog Gateway A means of connecting dissimilar codecs. Incoming

More information

Evolution from Voiceband to Broadband Internet Access

Evolution from Voiceband to Broadband Internet Access Evolution from Voiceband to Broadband Internet Access Murtaza Ali DSPS R&D Center Texas Instruments Abstract With the growth of Internet, demand for high bit rate Internet access is growing. Even though

More information

Computer System Management: Hosting Servers, Miscellaneous

Computer System Management: Hosting Servers, Miscellaneous Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation

More information

Multimedia Conferencing Standards

Multimedia Conferencing Standards Multimedia Conferencing Standards The ITU/TS sector has produced a number of international standards for real-time digital multimedia communication, including video and data conferencing. This chapter

More information

Alarm over IP. What is Alarm over IP? How does Alarm over IP work? Intrusion Systems White Paper Series Alarm over IP

Alarm over IP. What is Alarm over IP? How does Alarm over IP work? Intrusion Systems White Paper Series Alarm over IP Intrusion Systems White Paper Series Alarm over IP Alarm over IP What is Alarm over IP? Alarm over IP is the ability for security and fire alarm systems to transmit alarm signals over IP networks such

More information

ETSI TS 101 329-2 V1.1.1 (2000-07)

ETSI TS 101 329-2 V1.1.1 (2000-07) TS 101 329-2 V1.1.1 (2000-07) Technical Specification Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON); End to End Quality of Service in TIPHON Systems; Part 2: Definition

More information

Data Transmission. Data Communications Model. CSE 3461 / 5461: Computer Networking & Internet Technologies. Presentation B

Data Transmission. Data Communications Model. CSE 3461 / 5461: Computer Networking & Internet Technologies. Presentation B CSE 3461 / 5461: Computer Networking & Internet Technologies Data Transmission Presentation B Kannan Srinivasan 08/30/2012 Data Communications Model Figure 1.2 Studying Assignment: 3.1-3.4, 4.1 Presentation

More information

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique A Survey on Performance Analysis of, AES and RSA Algorithm along with LSB Substitution Technique B. Padmavathi 1, S. Ranjitha Kumari 2 1 Research Scholar, R.V.S College of Arts & Science (Autonomous )Sulur,

More information

PROGRAMMABLE LOGIC CONTROLLERS Unit code: A/601/1625 QCF level: 4 Credit value: 15 TUTORIAL OUTCOME 2 Part 1

PROGRAMMABLE LOGIC CONTROLLERS Unit code: A/601/1625 QCF level: 4 Credit value: 15 TUTORIAL OUTCOME 2 Part 1 UNIT 22: PROGRAMMABLE LOGIC CONTROLLERS Unit code: A/601/1625 QCF level: 4 Credit value: 15 TUTORIAL OUTCOME 2 Part 1 This work covers part of outcome 2 of the Edexcel standard module. The material is

More information

Secured Voice over VPN Tunnel and QoS. Feature Paper

Secured Voice over VPN Tunnel and QoS. Feature Paper Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3

More information

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise

Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise Communications Transformations 2: Steps to Integrate SIP Trunk into the Enterprise The Changing Landscape IP-based unified communications is widely deployed in enterprise networks, both for internal calling

More information

ADSL BROADBAND BASICS FOR THE DOMESTIC USER. The Main Limitations of ADSL Broadband are as follows.

ADSL BROADBAND BASICS FOR THE DOMESTIC USER. The Main Limitations of ADSL Broadband are as follows. ADSL BROADBAND BASICS FOR THE DOMESTIC USER AS NOTHING MAN MADE IS PERFECT, ADSL IS NOT AN EXCEPTION. The Main Limitations of ADSL Broadband are as follows. 1. ADSL is not a Guaranteed Bandwidth Service.

More information

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3

How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3 Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

(Refer Slide Time: 2:10)

(Refer Slide Time: 2:10) Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture-12 Multiplexer Applications-1 Hello and welcome to today s lecture on multiplexer

More information

IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655

IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2

More information

Evaluating The Performance of Symmetric Encryption Algorithms

Evaluating The Performance of Symmetric Encryption Algorithms International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,

More information

First Semester Examinations 2011/12 INTERNET PRINCIPLES

First Semester Examinations 2011/12 INTERNET PRINCIPLES PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES

More information

Long Distance Connection and WAN

Long Distance Connection and WAN Lecture 6 Long Distance Connection and WAN Digital Telephone, PCM and Nyquist Sampling Theorem DSU/CSU, T Line Series and OC line Series Local Loop DSL Technologies - ADSL, HDSL, SDSL, VDSL Cable Modem

More information

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue, Ver. III (Jan - Feb. 205), PP 0- e-issn: 239 4200, p-issn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES

More information

Advanced Higher Computing. Computer Networks. Homework Sheets

Advanced Higher Computing. Computer Networks. Homework Sheets Advanced Higher Computing Computer Networks Homework Sheets Topic : Network Protocols and Standards. Name the organisation responsible for setting international standards and explain why network standards

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard

More information

Analog vs. Digital Transmission

Analog vs. Digital Transmission Analog vs. Digital Transmission Compare at two levels: 1. Data continuous (audio) vs. discrete (text) 2. Signaling continuously varying electromagnetic wave vs. sequence of voltage pulses. Also Transmission

More information

CELL PHONE AUDIO CONTROLLED POINT OF SALE TECHNOLOGY REVIEW REPORT. Alana Sweat Group 9 October 18, 2008

CELL PHONE AUDIO CONTROLLED POINT OF SALE TECHNOLOGY REVIEW REPORT. Alana Sweat Group 9 October 18, 2008 CELL PHONE AUDIO CONTROLLED POINT OF SALE TECHNOLOGY REVIEW REPORT Alana Sweat Group 9 October 18, 2008 1. REVISION HISTORY 1 2. INTRODUCTION 2 2.1 CUSTOMER REQUIREMENTS & PROJECT BACKGROUND 2 2.2 PROJECT

More information

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS Ali M. Alsahlany 1 1 Department of Communication Engineering, Al-Najaf Technical College, Foundation of

More information

ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet.

ATA: An Analogue Telephone Adapter is used to connect a standard telephone to a high-speed modem to facilitate VoIP and/or calls over the Internet. KEY VOIP TERMS 1 ACD: Automatic Call Distribution is a system used to determine how incoming calls are routed. When the ACD system receives an incoming call it follows user-defined specifications as to

More information

Secure Voice v 1.1 Mobile conversation encryption for Symbian Smartphones

Secure Voice v 1.1 Mobile conversation encryption for Symbian Smartphones Secure Voice v 1.1 Mobile conversation encryption for Symbian Smartphones www.5pro-software.com General Info about Secure Voice Enterprise solution for mobile conversation security Secures sensitive information

More information

Wireless Access of GSM

Wireless Access of GSM Wireless Access of GSM Project Report FALL, 1999 Wireless Access of GSM Abstract: Global System for Mobile communications (GSM) started to be developed by Europeans when the removal of many European trade

More information

3. Designed for installation by the user without further substantial support by the supplier; and

3. Designed for installation by the user without further substantial support by the supplier; and Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 1 CATEGORY 5 TELECOMMUNICATIONS AND INFORMATION SECURITY Part 2 INFORMATION SECURITY Note 1: The control status of information

More information

Simulative Investigation of QoS parameters for VoIP over WiMAX networks

Simulative Investigation of QoS parameters for VoIP over WiMAX networks www.ijcsi.org 288 Simulative Investigation of QoS parameters for VoIP over WiMAX networks Priyanka 1, Jyoteesh Malhotra 2, Kuldeep Sharma 3 1,3 Department of Electronics, Ramgarhia Institue of Engineering

More information

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer

More information

Telecommunications systems (Part 2)

Telecommunications systems (Part 2) School of Business Eastern Illinois University Telecommunications systems (Part 2) Abdou Illia, Spring 2007 (Week 12, Thursday 3/29/2007) T-1 Digital Subscriber Line (DSL) Cellular Telephone System Integrated

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

IMPLEMENTATION OF THE ZERO-ERROR ONE SECOND TIMING ALGORITHM FOR MICROCONTROLLER

IMPLEMENTATION OF THE ZERO-ERROR ONE SECOND TIMING ALGORITHM FOR MICROCONTROLLER Journal of Naval Science and Engineering 2010, Vol. 6, No.2, pp. 133-148 IMPLEMENTATION OF THE ZERO-ERROR ONE SECOND TIMING ALGORITHM FOR MICROCONTROLLER Feyzi AKAR, Cdr Asst.Prof. Faculty of Electrical

More information

TYPE OF INTERNET CONNECTIONS. Dialup Cable Connection DSL Broadband Dedicated Leased Line ISDN Wireless Connection

TYPE OF INTERNET CONNECTIONS. Dialup Cable Connection DSL Broadband Dedicated Leased Line ISDN Wireless Connection Internet Connections By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: [email protected] How to acquire Connection? We are Basically connected

More information

INTERNET CONNECTIVITY

INTERNET CONNECTIVITY INTERNET CONNECTIVITY http://www.tutorialspoint.com/internet_technologies/internet_connectivity.htm Copyright tutorialspoint.com Here in this tutorial, we will discuss how to connect to internet i.e. internet

More information

Chapter 2 Logic Gates and Introduction to Computer Architecture

Chapter 2 Logic Gates and Introduction to Computer Architecture Chapter 2 Logic Gates and Introduction to Computer Architecture 2.1 Introduction The basic components of an Integrated Circuit (IC) is logic gates which made of transistors, in digital system there are

More information

Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002

Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support

More information

VIDEO CONFERENCE. Alessandro Benni & VIDEO COMMUNICATIONS. Bologna, 2007. Videorent srl - Video & Multimedia Branch

VIDEO CONFERENCE. Alessandro Benni & VIDEO COMMUNICATIONS. Bologna, 2007. Videorent srl - Video & Multimedia Branch VIDEO CONFERENCE & VIDEO COMMUNICATIONS Alessandro Benni Videorent srl - Video & Multimedia Branch Bologna, 2007 Today s lesson will cover What is Video Conference? Why Video Conference? History of Video

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

(Refer Slide Time: 4:45)

(Refer Slide Time: 4:45) Digital Voice and Picture Communication Prof. S. Sengupta Department of Electronics and Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 38 ISDN Video Conferencing Today we

More information

VoIP Bandwidth Considerations - design decisions

VoIP Bandwidth Considerations - design decisions VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or

More information

Voice and Delivery Data Networks

Voice and Delivery Data Networks Voice and Delivery Data Networks Chapter 11 Learning Objectives After reading this chapter, you should be able to: Identify the basic elements of a telephone system Describe the composition of the telephone

More information

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in 01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

How To Use Pretty Good Privacy (Pgp) For A Secure Communication Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security

More information

1 Data Encryption Algorithm

1 Data Encryption Algorithm Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been

More information

TCP/IP Network Communication in Physical Access Control

TCP/IP Network Communication in Physical Access Control TCP/IP Network Communication in Physical Access Control The way it's done: The security industry has adopted many standards over time which have gone on to prove as solid foundations for product development

More information

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing

More information

A Smart Telephone Answering Machine with Voice Message Forwarding Capability

A Smart Telephone Answering Machine with Voice Message Forwarding Capability A Smart Telephone Answering Machine with Voice Message Forwarding Capability Chih-Hung Huang 1 Cheng Wen 2 Kuang-Chiung Chang 3 1 Department of Information Management, Lunghwa University of Science and

More information